
1 Introduction
1.1 Cryptography based on number theory problems
1.2 Post-quantum cryptography
1.3 Lattice-based cryptosystems
2. Lattices
2.1 Definition
2.2 Discrete Gaussian
2.3 Small Integer Solutions
2.4 Learning with Errors
2.5 Trapdoor Generation
3. Public-key encryption
3.1 Definition
3.2 PKE against CPA attacks
3.2 Achieving CCA-Security in the random oracle model
3.3 CCA-secure PKE in the standard model
4. Identity-based encryption
4.1 Definition
4.2 The GPV IBE scheme
4.3 Short IBE in the standard model
5. Attribute-based encryption
5.1 Definition
5.2 ABE supporting and-gate policy
5.3 ABE supporting flexible threshold policy
5.4 Functional encryption
6. Key Exchanges
6.1 Definition
6.2 Key exchange against passive attacks
6.3 Implicit authenticated key exchange
6.4 Password-based authenticate key exchange
7. Digital signatures
7.1 Definition
7.2 Signatures in the random oracle model
7.3 Short signatures with tight security
7.4 Group signatures
Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.